![]() it is possible that a dictionary attack provides a WRONG password (an example: pass1="kelfrt." What is the command to set properly a brutal force attack?.Another method that I should try or how I should set the parameters to be able to do something faster ?.Now what else i should try (i'm trying right now -incremental but after 5 hours of processing has found a single password)?.(The largest dictionary used was around 14gb) dic and found a lot of more passwords: john -wordlist=wordlist.txt passwordToCrack.txt Tryed dictionary with a lot of different.Started with the default method of jtr: john passwordToCrack.txt (yes i'm on windows), and decrypted a lot of passwords.Untill now, i just used/followed these steps: ![]() Username : cryptedPassowrd : #userId : #groupId : Full name : UserHome/directory : /UserShell/ecc. ![]() I'm working on a University project and we must crack passwords. We teach you how to do it, use it at your own risk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |